Data Management
Security and Compliance Studio
Audit security
It is important to know which securable objects give access to sensitive data. For these types of securable objects, you can review the ones that give access to sensitive data:
Roles Duties Privileges Users You can use several charts to audit access to sensitive data:
Number of security objects with access to sensitive data Number of users with access to sensitive data per organization Number of roles per user with access to sensitive data Reasons to give roles access to sensitive data Each change in the access of securable objects to sensitive data is logged in the security history. You can view and analyze these events in the security history.
Security auditor
Security auditor
View securable
objects with
access to
sensitive data
View securable objects with access to sensitive data
It is important to know which securable objects give access to sensitive data. For these securable object types, you can review which securable objects give access to sensitive data:RolesDutiesPrivilegesUsers
Procedure
1. Click Security audit.
2. View the roles with access to sensitive data.
Click the Roles – Sensitive data access tab.
Note: If you select a role, you can view the related securable objects in the relevant tabs in the lower pane.
3. View the duties with access to sensitive data.
Click the Duties – Sensitive data access tab.
Note: If you select a duty, you can view the related securable objects in the relevant tabs in the lower pane.
4. View the privileges with access to sensitive data.
Click the Privileges – Sensitive data access tab.
Note: If you select a privilege, you can view the related securable objects in the relevant tabs in the lower pane.
5. View the users with access to sensitive data.
Click the Users – Sensitive data access tab.
Note: If you select a user, you can view the related roles in the lower pane.
View access to
sensitive data
charts
View access to sensitive data charts
You can use several charts to audit access to sensitive data:Number of security objects with access to sensitive dataNumber of users with access to sensitive data per organizationNumber of roles per user with access to sensitive dataReasons to give roles access to sensitive data
Procedure
1. Click Security audit.
2. Click the Charts tab.
3. Click the Number of security objects with access to sensitive data tab.
4. Click the Number of users with access to sensitive data per organization tab.
5. Click the Number of roles per user with access to sensitive data tab.
6. Click the Reasons to give roles access to sensitive data tab.
Start
Start
Audit security history
on access to
sensitive data?
Audit security history
on access to
sensitive data?
Audit security
history
Audit security history
In the Security and compliance studio, you can audit the security configuration in several ways. You can also generate a security history log report for audit or other compliance requirements.
Analyze sensitive
data access
in Microsoft Excel?
Analyze sensitive
data access
in Microsoft Excel?
Export sensitive
data access setup
to Microsoft
Excel
Export sensitive data access setup to Microsoft Excel
You can export sensitive data access setup to a Microsoft Excel file for further analysis.You can choose to export:All data of the sensitive data access setup.Only the sensitive data access setup that is related to a pinned security object in the security configuration.For example, for a pinned duty, you can export sensitive data setup for:The related roles.The users that are assigned to these roles.The related privileges.The entry points of these privileges.
Procedure
1. Click Security audit.
2. Click Manage sensitive data access.
3. In the Duties pane, in the list, find and select the desired record.
4. Click Pin duty.
5. Click Advanced view.
6. Click Export to Excel.
Note: As a result, the data is exported to a Microsoft Excel file. The file is downloaded to your downloads folder from where you can open it.
If you pinned a securable object before you exported the data, it is shown in red in the Microsoft Excel file.
7. Close the page.
End
End
Yes
No
Yes
No
Activities
Name
Responsible
Description
View securable objects with access to sensitive data
Security auditor
It is important to know which securable objects give access to sensitive data. For these securable object types, you can review which securable objects give access to sensitive data:Roles Duties Privileges Users
View access to sensitive data charts
Security auditor
You can use several charts to audit access to sensitive data:Number of security objects with access to sensitive data Number of users with access to sensitive data per organization Number of roles per user with access to sensitive data Reasons to give roles access to sensitive data
Audit security history
Security auditor
In the Security and compliance studio, you can audit the security configuration in several ways. You can also generate a security history log report for audit or other compliance requirements.
Export sensitive data access setup to Microsoft Excel
Security auditor
You can export sensitive data access setup to a Microsoft Excel file for further analysis. You can choose to export:All data of the sensitive data access setup. Only the sensitive data access setup that is related to a pinned security object in the security configuration. For example, for a pinned duty, you can export sensitive data setup for:The related roles. The users that are assigned to these roles. The related privileges. The entry points of these privileges.
See also